- sistemazioni Email : registrazione, invio invito, email di benvenuto

- fix circuito
- profilo
This commit is contained in:
Surya Paolo
2025-11-21 20:47:30 +01:00
parent 233c5fa28e
commit 5b1f3eafbc
34 changed files with 4835 additions and 1407 deletions

View File

@@ -334,7 +334,7 @@ router.post('/sendmailreg', authenticate, async (req, res) => {
const diffTime = Math.abs(now - user.lasttime_email_sent_verify);
const diffMinutes = Math.ceil(diffTime / (1000 * 60));
if (diffMinutes < 1) {
if (diffMinutes < 5) {
return res.status(200).send({ email_inviata: false, error: 'Attendi qualche minuto prima di reinviare nuovamente.' });
}
ris = await sendemail.sendEmail_Registration(user.lang, user.email, user, user.idapp, user.linkreg);
@@ -396,7 +396,7 @@ router.post('/settable', authenticate, async (req, res) => {
(await !tools.ModificheConsentite(req, params.table, fieldsvalue, mydata ? mydata._id : ''))
) {
// If without permissions, exit
return res.status(404).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
return res.status(server_constants.RIS_CODE_ERR_UNAUTHORIZED).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
}
if (shared_consts.TABLES_USER_ID.includes(params.table)) {
@@ -827,7 +827,7 @@ router.post('/getexp', authenticate, (req, res) => {
if (!User.isAdmin(req.user.perm) && !User.isManager(req.user.perm) && !User.isFacilitatore(req.user.perm)) {
// If without permissions, exit
return res.status(404).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
return res.status(server_constants.RIS_CODE_ERR_UNAUTHORIZED).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
}
try {
@@ -1334,7 +1334,7 @@ router.patch('/chval', authenticate, async (req, res) => {
!(mydata.table === 'accounts' && (await Account.canEditAccountAdmins(req.user.username, mydata.id)))
) {
// If without permissions, exit
return res.status(404).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
return res.status(server_constants.RIS_CODE_ERR_UNAUTHORIZED).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
}
const camporequisiti = UserCost.FIELDS_REQUISITI.includes(Object.keys(fieldsvalue)[0]);
@@ -1617,7 +1617,7 @@ router.patch('/askfunz', authenticate, async (req, res) => {
req.user._id.toString() !== id
) {
// If without permissions, exit
return res.status(404).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
return res.status(server_constants.RIS_CODE_ERR_UNAUTHORIZED).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
}
}
@@ -1676,7 +1676,7 @@ router.patch('/callfunz', authenticate, async (req, res) => {
req.user._id.toString() !== id
) {
// If without permissions, exit
return res.status(404).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
return res.status(server_constants.RIS_CODE_ERR_UNAUTHORIZED).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
}
}
@@ -1755,7 +1755,7 @@ router.delete('/delrec/:table/:id', authenticate, async (req, res) => {
(await !tools.ModificheConsentite(req, tablename, fields, id, req.user))
) {
// If without permissions, exit
return res.status(404).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
return res.status(server_constants.RIS_CODE_ERR_UNAUTHORIZED).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
}
let cancellato = false;
@@ -1863,7 +1863,7 @@ router.post('/duprec/:table/:id', authenticate, async (req, res) => {
const mytable = globalTables.getTableByTableName(tablename);
if (!req.user) {
return res.status(404).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
return res.status(server_constants.RIS_CODE_ERR_UNAUTHORIZED).send({ code: server_constants.RIS_CODE_ERR_UNAUTHORIZED, msg: '' });
}
/* if (!User.isAdmin(req.user.perm) && !User.isManager(req.user.perm)) {
@@ -1902,7 +1902,7 @@ router.post('/duprec/:table/:id', authenticate, async (req, res) => {
router.get('/loadsite/:userId/:idapp', authenticate_noerror_WithUserLean, async (req, res) => {
try {
// if ((req.statuscode2 = server_constants.RIS_CODE_HTTP_FORBIDDEN_TOKEN_EXPIRED)) {
// if ((req.statuscode2 = server_constants.RIS_CODE_HTTP_TOKEN_EXPIRED)) {
// return;
// }
@@ -2031,8 +2031,8 @@ async function load(req, res, version = '0') {
// Estrazione e validazione degli input
const userId = req.user ? req.user._id.toString() : req.params.userId || '0';
const idapp = req.params.idapp;
/*const status = req.code === server_constants.RIS_CODE_HTTP_FORBIDDEN_TOKEN_EXPIRED
? server_constants.RIS_CODE_HTTP_FORBIDDEN_TOKEN_EXPIRED
/*const status = req.code === server_constants.RIS_CODE_HTTP_TOKEN_EXPIRED
? server_constants.RIS_CODE_HTTP_TOKEN_EXPIRED
: 200;*/
let status = req.code;
@@ -2251,11 +2251,10 @@ async function load(req, res, version = '0') {
}
}
router.get(process.env.LINK_CHECK_UPDATES, authenticate_noerror, async (req, res) => {
router.get('/checkupdates', authenticate_noerror, async (req, res) => {
try {
const idapp = req.query.idapp;
// console.log("POST " + process.env.LINK_CHECK_UPDATES + " userId=" + userId);
if (!req.user) {
if (req.code === 1) return res.status(200).send();
else return res.status(req.code).send();